General

  • Target

    3422991ba6e3454449a9cec0ccce0edc0e3a0284fdf8972ff80b2092d9a8d246

  • Size

    793KB

  • Sample

    241112-l3n5pazfrn

  • MD5

    7bed7f31afb96587a52c8695e2f9861b

  • SHA1

    c7778d3dd540c6d867905d8ed4efd6f9043e4224

  • SHA256

    3422991ba6e3454449a9cec0ccce0edc0e3a0284fdf8972ff80b2092d9a8d246

  • SHA512

    5af5d9832a6bb10cfa46f7cd90265a92554f97cede8027b78cd6a995a2286794c9475c2621e9ffe539a739d236df2bef06458513a8474720dab8477cb2cf3c40

  • SSDEEP

    24576:L6ftojDBeSYnI21uZt6IZx89W0CxV9asvCpm2:LLp9oI2Af8Alm

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      3422991ba6e3454449a9cec0ccce0edc0e3a0284fdf8972ff80b2092d9a8d246

    • Size

      793KB

    • MD5

      7bed7f31afb96587a52c8695e2f9861b

    • SHA1

      c7778d3dd540c6d867905d8ed4efd6f9043e4224

    • SHA256

      3422991ba6e3454449a9cec0ccce0edc0e3a0284fdf8972ff80b2092d9a8d246

    • SHA512

      5af5d9832a6bb10cfa46f7cd90265a92554f97cede8027b78cd6a995a2286794c9475c2621e9ffe539a739d236df2bef06458513a8474720dab8477cb2cf3c40

    • SSDEEP

      24576:L6ftojDBeSYnI21uZt6IZx89W0CxV9asvCpm2:LLp9oI2Af8Alm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks